Threats Feed|Tracer Kitten|Last Updated 24/01/2025|AuthorCertfa Radar|Publish Date14/09/2020

TRACER KITTEN's Sophisticated Attack on EMEA Telecommunications Network

  • Actor Motivations: Espionage,Exfiltration
  • Attack Vectors: Backdoor
  • Attack Complexity: Medium
  • Threat Risk: High Impact/Low Probability

Threat Overview

In April 2020, Iran-based threat actor TRACER KITTEN targeted a telecommunications company in the EMEA region, leveraging valid credentials and custom backdoors for persistent access and C2 communications. The adversary employed SSH tunnels, masqueraded tools, and rogue Windows services to evade detection. Credential theft attempts involved LSASS dumps via comsvcs.dll and a modified Mimikatz. Reconnaissance was extensive, using native Windows tools to enumerate users, groups, and services, followed by a pass-the-hash attempt with Invoke-TheHash. Early detection allowed defenders to mitigate potential data exfiltration.

Detected Targets

TypeDescriptionConfidence
SectorTelecommunication
Verified
RegionMiddle East Countries
Verified
RegionEuropean Countries
Verified
About Affiliation
Tracer Kitten